Implementation and Design of Graphical Password System Using Image Fusion

Size: px
Start display at page:

Download "Implementation and Design of Graphical Password System Using Image Fusion"

Transcription

1 International Journal of Innovative Research in Electronics and Communications (IJIREC) Volume 1, Issue 6, September 2014, PP ISSN (Print) & ISSN (Online) Implementation and Design of Graphical Password System Using Image Fusion 1 G. Madhavi, 2 N. Ramakrishna, 3 N.Moorthy Muthukrishnan 1 Dept. of ECE, 2,3 Dept.of ETM G.Narayanamma Institute of Technology and Science Hyderabad, INDIA. 1 gmadhavi54@gmail.com, 2 ramakn@gmail.com, 3 nmoorthy2001@yahoo.com Abstract: User authentication is a fundamental component in most computer security contexts. It provides the basis for access control and user accountability. While there are various types of user authentication systems, alphanumerical passwords are most widely used user authentication. Users are known to choose easily guessable and short text passwords, which are easy targets of dictionary and brute-forced attacks. Enforcing a strong password policy sometimes leads to an opposite effect, as a user may resort to writing his or her difficult-to-remember passwords on sticky notes or back of the debit card exposing them to direct theft.the graphical passwords are preferable authentication systems where users click on images to authenticate themselves. Graphical password schemes have been proposed as possible alternatives to textbased schemes, motivated partially by the fact that humans can remember pictures better than text [1].This paper aims at implementing the simple Graphical Password Authentication System using fusion algorithm. The proposed work includes three phases- Registration, Training and Authentication. Keywords: Graphical password, Alphanumeric password, passpoints, Authentication, passwordsecurity. 1. INTRODUCTION Nowadays, the most widely used authentication mechanism is the textual passwords. However, it is well known, that most users are frustrated by their experiences with these traditional passwords in general. Even if they want to behave securely, they often do not understand what constitutes a secure password since guidelines for the creation of secure passwords are seldom adequate. Even with good guidelines in place, human nature will lead users to prefer the least resistance path e.g. choosing easy passwords, storing them in plain text on their mobile phones or reusing those [2]. Traditional way of user authentication is by prompting the user to key in their username and password. This method is widely used in many authentication systems. However, the approach has many drawbacks; such as passwords can easily be guessed, vulnerable to key-logger and spyware. Alphanumerical passwords are required to satisfy two requirements. One is the password should be easily remembered by a user, while they have to be hard to guess by attackers. Many problems that users have with alphanumeric passwords are related to memorability of secure passwords. In an attempt to create more memorable passwords, graphicalpasswordsystems came into existence. In these systems authentication is based on clicking on images rather thantyping alphanumeric strings. Graphical passwords which use pictures as passwords instead of using alphanumeric characters. The main motivation for graphical passwords is that people are better at remembering images than alphanumeric. For example we can recognize the people we know from thousands of faces; this fact was used to implement an authentication system. This is the basis for the graphical passwords [3]. A survey of numerous graphical password schemes have been developed which classifies the password systems as recognition-based systems, pure recall based systems, and cued recall based systems. In recognition-based systems, users would choose pictures, icons from a collection of images. In authentication process, the users need to recognize their registration choice among a set of candidates. The research shows that 90% of users can remember their passwords after one or two month [4]. In pure recall-based graphical password schemes, users need to reproduce their ARC Page 20

2 Implementation and Design of Graphical Password System Using Image Fusion password without being given any hints or cues. Jeremyn et al. described a graphical password scheme Draw a Secret" (DAS), where the user has to draw a something shape or pictures on a grid. Users need to draw approximately the same shape in order to authenticate themselves. The graphicalpassword schemes based on pure recall are quick and convenient to use, but they have the same disadvantage as alphanumeric password: They are hard to remember [5] [6].In cued recall, the users have to recall a password, but the system offers a framework of hints, context, and cues, that help the users reproduce their password or help them make the reproduction more accurate. Here, the user is shown an image on the screen, and the password consists of a few points that the user chooses in the image (by clicking or pointing). Authentication is performed by clicking near the previously determined points. Cued recall is intermediate between recognition and pure recall. 2. METHODOLOGY Our proposed work implements the two simple graphical password schemes to provide more security. They are click-based image fusion and connectivity-based image fusion technique. 2.1 Click-based Image fusion Technique The click-based image fusion technique was designed to improve the security and to reduce the dictionary attacks. In order to improve the security the image fusion algorithm has been introduced in click-based image fusion technique. In this method the password constitutes a single click point on the source image. In click-based image fusion user has to select a pixel and fusion is performed. In registration phase standard deviation of the fused image is calculated and image space is created in training phase. Authentication is done by comparing standard deviation of the image with image space.the proposed method includes two phases. One is registration phase and second one is verification phase Registration Phase: Select an image Select a pixel in the image Image Fusion Calculate parameters Creation of image space Figure 2.1. Flowchart for click-based image fusion technique in registration phase Verification Phase: Select an image Select a point in the image Image Fusion Calculate parameters Comparison Matched Figure 2.2. Flowchart for click-based image fusion technique in verification phase International Journal of Innovative Research in Electronics and Communications (IJIREC) Page 21

3 G. Madhavi et al. The following steps give the detailed description about the registration and verification phase. Step 1: Select an image In this step user need to select an image from the available list of images provided by the system database. Step 2: Select a pixel in the image In step-2 user has to select a pixel from the selected image by using user interaction with the mouse pointer. Step 3: Image fusion Image Fusion is a process of combining the relevant information from a set of images, into a single image, wherein the resultant fused image will be more informative and complete than any of the input images [7]. The image fusion is performed on the user selected image. This will provide high security because the user selected image is fused with the second image that is randomly generated by the system. In this paper the pixel-level image fusion was done in this method;it assumes that the input images are to be of equal size and spatial resolution. The sequence of operations carried out in pixel-level image fusion is as explained below[8][9] [10]: A)Read the set of images i.e. here in this algorithm we have considered two images which are of same size. B)Fusion factor can be varied to vary the proportion of mixing of each image. With Fusion factor = 0.5, the two images are mixed equally. With Fusion factor< 0.5, the contribution of background image will be more. With Fusion factor> 0.5, the contribution of foreground image will be more. In this method we have consider fusion factor= 0.5.here the selected pixel in step2 is considered as fusion factor(x) C)The image fusion is done by this formula Fused image = x*first image + (1-x)second image Where x is fusion factor and choose x<1. Step 4: Calculating the statistical parameters for the fused image. Step 5: image space is created by using fusion parameters. In the verification phase, in step1, the user has to choose an image that he/she selected during the registration phase. In step2 user need to choose a pixel from the chosen image and fusion is performed. The statisticalparameters of the fused image is compared is compared with Image space created in registration phase. If it matches any one value of Image space then image matching will be done. 2.2 Connectivity-based Image fusion Technique The technique is broadly classified in to two phases i.e., registration phase and verification phase. In click-based image fusion technique, in order to log in, the user has to select pixel by clicking on particular pixel; within the image.the tolerance is needed because the user s click point literally is a single pixel, which is too precise for a user to click on successfully. In order to overcome this drawback, we are proposing the connectivity based image fusion technique. In connectivity-based image fusion user has to select series of images and connected components and fusion is performed. Fusion parameters are calculated in registration phase. Training phase International Journal of Innovative Research in Electronics and Communications (IJIREC) Page 22

4 Implementation and Design of Graphical Password System Using Image Fusion creates image spaceusing fusion parameters. K-NN classifier is used for authenticationin verification phase Registration phase: The following steps give detailed explanation of operations involved in registration phase. Step 1: Select an image In the registration and verification phase the user has to select two input images from the list of images provided in the database. Step 2: Specify connectivity Here the user has to specify connectivity by entering the number for 4 or 8 connectivity. The following sequences of operations are performed to get connected components A) The selected inputs itself is taken as input images. B) The pre-processing method uses the median filtering and the output thus formed is free from noise and can be used in the next step for edge detection. Median filtering is a nonlinear process useful in reducing impulsive noise. It is also useful in preserving edges in an image while reducing random noise. In a median filter, a window slides along the image, and the median intensity values of the pixels in the window becomes the output intensity of the pixel being processed. For example, suppose the pixel values in a window are 5, 6, 55, 10 and 15 and the pixel being processed has a value of 55. The output of the median filter and the current pixel location is 10 which is the median of five values. The median filtering smoothens the image and it can preserve discontinuities in a step function and can smooth a few pixels whose values differ significantly from their surroundings without effecting other pixels. An important parameter in using the median filter is the window size. If it is less than 5, the two pixels with impulsive values will not be significantly affected. For large window, they will be. Thus this choice depends on the context because it is difficult to choose the optimum window size in advance. C) In the edge detection, the Sobel Operator is used to detect edges. The Sobel operator find edges using the Sobel approximation to the derivative. It precedes the edges at those points where the gradient is highest. The Sobel technique performs a 2-D spatial gradient quantity on an image and highlights regions of high spatial frequency that correspond to edges. In general it is used to find the estimated absolute gradient magnitude at each point in n input gray scale image. In conjecture at least the operator consists of a pair of 3x3 complication kernels as given away in below figure. One kernel is simply the other rotated by 90 o Figure 2.3: Sobel Operators with G x and G y respectively D) The image with the detected edges has connected components and here the number of connected components has to be reduced to extract the required data of pixels. The reduction of connected components is done by using 4 components. E) After reducing the connected components we identify the number of connected components and extract the desired values. The following algorithm shows the different operations involved in the connectivity. International Journal of Innovative Research in Electronics and Communications (IJIREC) Page 23

5 G. Madhavi et al. Input image Preprocessing (Median filtering) Edge detection Reducing no.of connected components Calculating connected components Step 3: Image Averaging Resultant image Figure 2.4. Algorithm for connectivity In image averaging the resultant image is obtained by simple averaging corresponding pixels in each input image as: Where i: 1 to m and j: 1 to n Step 4: Image fusion The pixel based image fusion algorithm is performed on the averaging image. The Steps for the image fusion is as discussed earlier in step3 of the first technique. Step 5: Finally calculates the parameters for the fused image. Step 6: Image space is created using fusion parameters. The flow of operations involved in registration phase is as shown below Select input1 Select input2 Specify Connectivity Specify Connectivity Image averaging Image fusion Calculating Parameters Image space Figure 2.5. Flowchart for connectivity-based Image fusion in registration phase International Journal of Innovative Research in Electronics and Communications (IJIREC) Page 24

6 Implementation and Design of Graphical Password System Using Image Fusion Verification phase: Select input1 Select input2 Specify Connectivity Specify Connectivity Image averaging Image fusion Calculating Parameters Classifier Matched Figure 2.6. Flowchart for connectivity-based Image fusion in verification phase In the verification phase the user has to repeat the same steps from step1 to step5 as registration phase. In step6 the k-nn classifier is used to compare the performance metrics of the verification phase with the registration phase and authentication is done for the user. The k-nearest Neighbors algorithm (k-nn) is a non-parametric method used for classification. In classification, the input consists of the k closest training examples in the feature space. In k-nn classification, the output is a class membership. An object is classified by a majority of its neighbors, with the object being assigned to the class most common among its knearest neighbors (k is a positive integer, typically small). If k = 1, then the object is simply assigned to the class of that single nearest neighbor. The advantages of k-nn classifier are it is easy to implement and debug, there are some noise reduction techniques that work only for k-nn that can be effective in improving the accuracy of the classifier. 3. PERFORMANCE METRICS The statistical parameters have been calculated for the fused image. Standard deviation is ameasureofdispersioninafrequencydistribution obtainedbyextractingthe squareroot ofthe mean ofthesquares oftheobservedvaluesfromthearithmeticmeanofthedistribution. It should be maximum. The standard deviation is given by Where And n is the number of elements in the sample, is the mean and is ith element in the sample. International Journal of Innovative Research in Electronics and Communications (IJIREC) Page 25

7 G. Madhavi et al. 4. RESULTS AND DISCUSSIONS The graphical password authentication systems have been developed by using the techniques as discussed earlier and the results are shown below. 4.1 Click-based Image fusion Technique Figure 4.1. GUI frame with list box and message box In figure 4.1, the GUI layout consists of listbox, read button and process button as shown below. Where the listbox contains collection of different images. After selecting the image from listbox in order to read the image the user has to click on read button. The process button is used to carry set of operations. Figure 4.2 shows the matching process where it compares some performance metrics based on these results the authentication will be done, if it matches then the user will be successfully authenticated. Figure 4.2. GUI frame of verification phase The table 1 shows the matching process of the verification phase. Standard deviation (SD) of images is considered as image feature. In verification phase the standard deviation value of test image is calculated and compared with image space created during registration phase. In our proposed work, FAR or FRR considered as false detection. If there is a fractional change in mouse click point which results as false rejection (FR). If there is a same intensity click point on image other than desired one results in false acceptance ratio (FAR). International Journal of Innovative Research in Electronics and Communications (IJIREC) Page 26

8 Implementation and Design of Graphical Password System Using Image Fusion Table 1. Shows training and recognition phases of click-based image fusion technique Registration phase S.D Test image in verification phase Comparison False detection Capture1.jpg 68 Flwr1.jpg No Fabric200.jpg 82 Flwr1.jpg No Flwr1.jpg 51 Flwr1.jpg Matched No Peppers.jpg 91 Flwr1.jpg No CT.jpg 37 Flwr1.jpg No B2jpg 41 Flwr1.jpg No T65a.jpg 12 Flwr1.jpg No T80a.jpg 46 Flwr1.jpg Matched yes liftingbody.jpg 60 Flwr1.jpg No Images121.jpg 53 Flwr1.jpg Matched Yes 4.2 Connectivity-based Image fusion Technique In Figure 4.3 the GUI window having listbox which consists of collection different natural images, edit text where the user can enter the number using keyboard and axes where it displays the user selected images and pushbutton is to perform some operations. Figure 4.3. GUI Layout with listbox, axes and push buttons Figure 4.4. GUI results of verification phase International Journal of Innovative Research in Electronics and Communications (IJIREC) Page 27

9 Standard deviation G. Madhavi et al. The figure 4.4 shows the matching process where it compares some performance metrics based on these results the authentication will be done, if it matches then the user will be successfully authenticated. Table 2. Shows training and recognition phases of connectivity- based image fusion technique Registration Test images in verification phase phase SD Input1 Input2 Input1 Input2 B2 flwr 20 T70a flwr 16 T71a T86a Images121 football P30b Capture1 Peppers Westcord T4a T65a 18 k-nn Classifier Matched Matched In table-2 two input images are selected from data set and average of the connected components are fused, the standard deviation of fused image is calculated.the two test images in verification phase are compared with the registration phase by using k-nn classifier and give the result as matched or unmatched. As there is no click point is required in connectivity- based image fusion the false detection can be avoided. Figure 4.5 shows the standard deviation of the images in the dataset. This standard deviation is consideredas image feature in our proposed algorithm Image features SD Image dataset Table 3. Comparison of graphical password systems Techniques Passpoint Technique[3] Cued click point technique[11] Figure 4.5. Image dataset with SD values Image size 421x x x x470 No. of Click points Connected components 3 Not Considered 3 Not Considered False detection Yes Yes User interaction Mouse click point Mouse click point International Journal of Innovative Research in Electronics and Communications (IJIREC) Page 28

10 Implementation and Design of Graphical Password System Using Image Fusion Click-based Imagefusion Connectivity -based Image fusion 256x x x x242 1 Not Considered Yes Mouse click point 0 Considered No Selection of connectivity The table-3 shows comparison of different graphical password systems. In the image dataset different image sizes are considered for different methods as shown in table. The number of click points required in passpoint and cued-click point techniques is 3; where as in connectivity- based image fusion no click point is required. The connected components are considered for password generation in connectivity-based image fusion method. No false detection is observed in connectivity-based image fusion as it is depended on connectivity but not on click point. 5. CONCLUSIONS The graphical password authentication system using fusion algorithms are discussed. The two methods namely click- based image fusion and connectivity-based graphical password authentication. Alphanumeric passwords lead to guessable password practices and lower overall security. It is found that the click based image fusion is giving 80% accuracy. The drawback of this method requires precise click point during authentication. However, click points seems to hold out the prospect of a much more secure system. First of all, it is easy to obtain large passwords spaces, based on user interaction, images with hundreds of potential click points. Second, this allows safe storage and protection during file back-up. Third, it appears from the small sample in our experiment that users did not too often chose points that were within a circle chosen by another individual. Moreover, the use image fusion using machine selected image and authentication based on statistical parameters reduces the possibility of users having the same click points even if they are attracted to a salient area of the image. This reduces the chance of an attacker being able to guess passwords. With respect to usability, which is the main focus of this paper, our results indicate first that users can quickly and easily create graphical password. Second, most users can quickly learn to input graphical passwords without error, and even those who do make repeated errors can input them successfully given enough practice.it is found that the connectivity based image fusion is giving 90% accuracy. This method avoids precise selection of click point for image authentication. REFERENCES [1] Bashier, H.K.; Lau Siong Hoe; Pang Ying Han, "Graphical password: Pass-images Edge detection," Signal Processing and its Applications (CSPA), 2013 IEEE 9th International Colloquium on, vol., no., pp.111,116, 8-10 March [2] Renaud. K.; Mayer. P.; Volkamer, M.; Maguire, J., "Are graphical authentication mechanisms as strong as passwords?" Computer Science and Information Systems (FedCSIS), 2013 Federated Conference on, vol., no., pp.837,844, 8-11 Sept [3] S.Wiedenbeck, J.Waters, J. Birget, A. Brodskiy, and N. Memon, PassPoints: Design and longitudinal evaluation of a graphical password system, International Journal of Human- Computer Studies, vol. 63, no. 1-2, pp , [4] English, R.; Poet, R., "Towards a metric for recognition-based graphical password security," Network and System Security (NSS), th International Conference on, vol., no., pp.239,243, 6-8 Sept [5] Agarwal, G.; Singh, S.; Indian, A, "Analysis of knowledge based graphical password authentication," Computer Science & Education (ICCSE), th International Conference on, vol., no., pp.588,591, 3-5 Aug [6] FarnazTowhidi, Maslin Masrom, A Survey on Recognition-Based Graphical User Authentication Algorithms, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 6, No. 2, [7] Hasegawa, M.; Tanaka, Y.; Kato, S., "A study on an image synthesis method for graphical passwords," Intelligent Signal Processing and Communication Systems,ISPACS International Symposium on, vol., no., pp.643,646, 7-9 Jan International Journal of Innovative Research in Electronics and Communications (IJIREC) Page 29

11 G. Madhavi et al. [8] ShivsubramaniKrishnamoorthy, K P Soman, Implementation and Comparative Study of Image Fusion Algorithms International Journal of Computer Applications ( ), Volume 9 No.2, November [9] V.P.S. Naidu and J.R. Raol Pixel-level Image Fusion using Wavelets and Principal Component Analysis Defence Science Journal, Vol. 58, No. 3, May 2008, pp , [10] Chetan K. Solanki, Narendra M. Patel Pixel based and Wavelet based Image fusion Methods with their Comparative Study National Conference on Recent Trends in Engineering & Technology. [11] Chiasson. S, van Oorschot. P, and Biddle. R, Graphical password authentication using Cued Click Points, in European Symposium On Research In Computer Security (ESORICS), LNCS 4734, September 2007, pp International Journal of Innovative Research in Electronics and Communications (IJIREC) Page 30

Cued Click Point Technique for Graphical Password Authentication

Cued Click Point Technique for Graphical Password Authentication Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Graphical User Authentication System An Overview P. Baby Maruthi 1, Dr. K. Sandhya Rani 2

Graphical User Authentication System An Overview P. Baby Maruthi 1, Dr. K. Sandhya Rani 2 Graphical User Authentication System An Overview P. Baby Maruthi 1, Dr. K. Sandhya Rani 2 1 Research Scholar: Dept of Computer Science S.P.M.V.V, Tirupati, Andhra Pradesh, India mail2maruthi03@gmail.com

More information

Defenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points

Defenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 4, April 2013,

More information

Recall Based Authentication System- An Overview

Recall Based Authentication System- An Overview Recall Based Authentication System- An Overview P. Baby Maruthi 1, Dr. K. Sandhya Rani 2 1 Research Scholar: Dept of Computer Science S.P.M.V.V, Tirupati, Andhra Pradesh, India 2 Professor: Dept of Computer

More information

DESIGN, IMPLEMENTATION AND EVALUATION OF A KNOWLEDGE BASED AUTHENTICATION SCHEME UPON COMPELLING PLAIT CLICKS

DESIGN, IMPLEMENTATION AND EVALUATION OF A KNOWLEDGE BASED AUTHENTICATION SCHEME UPON COMPELLING PLAIT CLICKS http:// DESIGN, IMPLEMENTATION AND EVALUATION OF A KNOWLEDGE BASED AUTHENTICATION SCHEME UPON COMPELLING PLAIT CLICKS Chalichima Harshitha 1, Devika Rani 2 1 Pursuing M.tech (CSE), 2 Assistant professor

More information

A New Hybrid Graphical User Authentication Technique based on Drag and Drop Method

A New Hybrid Graphical User Authentication Technique based on Drag and Drop Method A New Hybrid Graphical User Authentication Technique based on Drag and Drop Method Salim Istyaq, Khalid Saifullah Assistant Professor, Dept. of Computer Engineering, EES, University Polytechnic, Faculty

More information

Securing Web Accounts Using Graphical Password Authentication through MD5 Algorithm

Securing Web Accounts Using Graphical Password Authentication through MD5 Algorithm Securing Web Accounts Using Graphical Password Authentication through MD5 Algorithm Siddheshwar A. Suratkar Rahul A. Udgirkar Pratik D. Kale Amit A. Shelke Mohsin H. Shaikh Prof. D. C. Dhanwani Prof. CSE,

More information

Graphical Password to Increase the Capacity of Alphanumeric Password

Graphical Password to Increase the Capacity of Alphanumeric Password Graphical Password to Increase the Capacity of Alphanumeric Password Gaddam Ramu Computer Science & Engineering. S.R.Engineering College, Warangal, Telangana, India. Goje Roopa(Asst.Prof) Computer Science

More information

MULTIPLE GRID BASED GRAPHICAL TEXT PASSWORD AUTHENTICATION

MULTIPLE GRID BASED GRAPHICAL TEXT PASSWORD AUTHENTICATION MULTIPLE GRID BASED GRAPHICAL TEXT PASSWORD AUTHENTICATION Vinothini T 1, Rajesh I 2, Kirupa Rani D 3 1 PG Scholar, Dept of CSE, Knowledge Institute of Technology, Salem, Tamil Nadu, India 2 Associate

More information

ENHANCEMENT OF SECURITY FEATURE IN GRAPHICAL PASSWORD AUTHENTICATION

ENHANCEMENT OF SECURITY FEATURE IN GRAPHICAL PASSWORD AUTHENTICATION International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR) ISSN 2249-6831 Vol. 3, Issue 2, Jun 2013, 395-402 TJPRC Pvt. Ltd. ENHANCEMENT OF SECURITY FEATURE IN

More information

ChoCD: Usable and Secure Graphical Password Authentication Scheme

ChoCD: Usable and Secure Graphical Password Authentication Scheme Indian Journal of Science and Technology, Vol 10(4), DOI: 10.17485/ijst/2017/v10i4/110885, January 2017 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 ChoCD: Usable and Secure Graphical Password Authentication

More information

M.Ashwini 1,K.C.Sreedhar 2

M.Ashwini 1,K.C.Sreedhar 2 Improved Persuasive Cued Click Points For Knowledge-Based Authentication M.Ashwini 1,K.C.Sreedhar 2 1 M.Tech Student, Dept of CSE, QIS College of Engineering & technology, Ongole, Prakasam Dist, A.P, India

More information

Divide and Conquer Approach for Solving Security and Usability Conflict in User Authentication

Divide and Conquer Approach for Solving Security and Usability Conflict in User Authentication Divide and Conquer Approach for Solving Security and Usability Conflict in User Authentication Shah Zaman Nizamani Waqas Ali Sahito Shafique Awan Department of IT Department of IT Department of Computer

More information

Graphical User Authentication Using Random Codes

Graphical User Authentication Using Random Codes Graphical User Authentication Using Random Codes Mr.D.S.Gawande 1, Manisha P. Thote 2, Madhavi M. Jangam 3, Payal P. Khonde 4, Payal R. Katre 5, Rohini V. Tiwade 6 1Assistant Professor, Computer Science

More information

KNOWLEDGE BASED AUTHENTICATION MECHANISM FOR SECURED DATA TRANSFER

KNOWLEDGE BASED AUTHENTICATION MECHANISM FOR SECURED DATA TRANSFER KNOWLEDGE BASED AUTHENTICATION MECHANISM FOR SECURED DATA TRANSFER R.T.Narmadha1, R.T.Nivetha2, M.Roobia Fathima 2, P.Vijayalakshmi 2 1 Department of Information Technology, Info Institute of Engineering,

More information

Authentication schemes for session password using color and special characters

Authentication schemes for session password using color and special characters Authentication schemes for session password using color and special characters Rohit Jagtap1, a, Vaibhav Ahirrao2,b Vinayak Kadam3,c Nilesh Aher4 1.Department of Computer Engineering, 2 Department of Computer

More information

3LAS (Three Level Authentication Scheme)

3LAS (Three Level Authentication Scheme) 3LAS (Three Level Authentication Scheme) Kunal Mulwani 1, Saurabh Naik 2, Navinkumar Gurnani 3, Dr. Nupur Giri 4, Prof. Sharmila Sengupta 5 1, 2,3,4,5 Vivekanand Education Society's Institute of Technology,

More information

Authentication Using Grid-Based Authentication Scheme and Graphical Password

Authentication Using Grid-Based Authentication Scheme and Graphical Password Authentication Using Grid-Based Authentication Scheme and Graphical Password Vijayshri D. Vaidya 1 Department of Computer engineering SND COE & RC Yeola, India Imaran R. Shaikh 2 Department of Computer

More information

KNOWLEDGE BASED AUTHENTICATION SYSTEM DESIGN BASED ON PERSUASIVE CUED CLICK POINTS

KNOWLEDGE BASED AUTHENTICATION SYSTEM DESIGN BASED ON PERSUASIVE CUED CLICK POINTS http:// KNOWLEDGE BASED AUTHENTICATION SYSTEM DESIGN BASED ON PERSUASIVE CUED CLICK POINTS G Anil Kumar 1, K Devika Rani 2 1 Pursuing M.tech (CSE), 2 Assistant professor (CSE), Nalanda Institute of Engineering

More information

A GRAPHICAL PASSWORD BASED AUTHENTICATION BASED SYSTEM FOR MOBILE DEVICES

A GRAPHICAL PASSWORD BASED AUTHENTICATION BASED SYSTEM FOR MOBILE DEVICES Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

SHOULDER SURFING RESISTANT GRAPHICAL PASSWORD

SHOULDER SURFING RESISTANT GRAPHICAL PASSWORD SHOULDER SURFING RESISTANT GRAPHICAL PASSWORD Kruthi K 1, Kumuda B G 2, Nandhini N V 3, Mrs. R.Anitha 4 (Associate Professor) 1, 2, 3, 4 Department of Computer Science and Engineering, The National Institute

More information

Graphical password authentication using Pass faces

Graphical password authentication using Pass faces RESEARCH ARTICLE OPEN ACCESS Graphical password authentication using Pass faces Ms Grinal Tuscano*, Aakriti Tulasyan**, Akshata Shetty**, Malvina Rumao**, Aishwarya Shetty ** *(Department of Information

More information

USING EMOJI PICTURES TO STRENGTHEN THE IMMUNITY OF PASSWORDS AGAINST ATTACKERS

USING EMOJI PICTURES TO STRENGTHEN THE IMMUNITY OF PASSWORDS AGAINST ATTACKERS USING EMOJI PICTURES TO STRENGTHEN THE IMMUNITY OF PASSWORDS AGAINST ATTACKERS Dr. Mohammed A. Fadhil Al-Husainy Raghda Ahmed Malih Department of Computer Science, Faculty of Information Technology, Middle

More information

Graphical Password or Graphical User Authentication as Effective Password Provider

Graphical Password or Graphical User Authentication as Effective Password Provider www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 9 September 2013 Page No. 2765-2769 Graphical Password or Graphical User Authentication as Effective

More information

Innovative Graphical Passwords using Sequencing and Shuffling Together

Innovative Graphical Passwords using Sequencing and Shuffling Together Innovative Graphical Passwords using Sequencing and Shuffling Together Rashmi Wable 1, Dr.Suhas Raut 2 N.K. Orchid College of Engineering and Technology, Solapur ABSTRACT Graphical authentication technology

More information

A STUDY OF GRAPHICAL PASSWORDS AND VARIOUS GRAPHICAL PASSWORD AUTHENTICATION SCHEMES

A STUDY OF GRAPHICAL PASSWORDS AND VARIOUS GRAPHICAL PASSWORD AUTHENTICATION SCHEMES , pp.-04-08. Available online at http://www.bioinfo.in/contents.php?id=219 A STUDY OF GRAPHICAL PASSWORDS AND VARIOUS GRAPHICAL PASSWORD AUTHENTICATION SCHEMES ASHWINI FULKAR*, SUCHITA SAWLA, ZUBIN KHAN

More information

International Journal of Pure and Applied Sciences and Technology

International Journal of Pure and Applied Sciences and Technology Int. J. Pure Appl. Sci. Technol., 1(2) (2010), pp. 60-66 International Journal of Pure and Applied Sciences and Technology ISSN 2229-6107 Available online at www.ijopaasat.in Research Paper Security Analysis

More information

A Hybrid Password Authentication Scheme Based on Shape and Text

A Hybrid Password Authentication Scheme Based on Shape and Text JOURNAL OF COMPUTERS, VOL. 5, NO. 5, MAY 2010 765 A Hybrid Password Authentication Scheme Based on Shape and Text Ziran Zheng School of Management & Economics Shandong Normal University, Jinan, China Email:

More information

A Survey on Recall-Based Graphical User Authentications Algorithms

A Survey on Recall-Based Graphical User Authentications Algorithms A Survey on Recall-Based Graphical User Authentications Algorithms D.Aarthi 1, Dr.K.Elangovan 2 1 School of Computer Science and Engineering, Bharathidasan University, Trichy, India 2 School of Computer

More information

A New Graphical Password: Combination of Recall & Recognition Based Approach

A New Graphical Password: Combination of Recall & Recognition Based Approach A New Graphical Password: Combination of Recall & Recognition Based Approach Md. Asraful Haque, Babbar Imam International Science Index, Computer and Information Engineering waset.org/publication/9997703

More information

Minimizing Shoulder Surfing Attack using Text and Color Based Graphical Password Scheme

Minimizing Shoulder Surfing Attack using Text and Color Based Graphical Password Scheme Minimizing Shoulder Surfing Attack using Text and Color Based Graphical Password Scheme 1 Prof. S. K. Sonkar, 2 Prof. R. L. Paikrao Computer Engineering Dept. Amrutvahini College of engineering Sangamner,

More information

Novel Shoulder-Surfing Resistant Authentication Schemes using Text-Graphical Passwords

Novel Shoulder-Surfing Resistant Authentication Schemes using Text-Graphical Passwords Institute of Advanced Engineering and Science International Journal of Information & Network Security (IJINS) Vol.1, No.3, August 2012, pp. 163~170 ISSN: 2089-3299 163 Novel Shoulder-Surfing Resistant

More information

A Secure Graphical Password Authentication System

A Secure Graphical Password Authentication System International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 12, Number 2 (2016), pp. 197-201 Research India Publications http://www.ripublication.com A Secure Graphical Password

More information

Design & Implementation of Online Security Using Graphical Password Systems Using Captcha Technique

Design & Implementation of Online Security Using Graphical Password Systems Using Captcha Technique Design & Implementation of Online Security Using Graphical Password Systems Using Captcha Technique ABSTRACT: Many security primitives are based on hard mathematical problems. Using hard AI problems for

More information

Randomized Image Passwords and A QR Code based Circumnavigation Mechanism for Secure Authentication

Randomized Image Passwords and A QR Code based Circumnavigation Mechanism for Secure Authentication IJIRST International Journal for Innovative Research in Science & Technology Volume 2 Issue 04 September 2015 ISSN (online): 2349-6010 Randomized Image Passwords and A QR Code based Circumnavigation Mechanism

More information

MIBA: Multitouch Image-Based Authentication on Smartphones

MIBA: Multitouch Image-Based Authentication on Smartphones MIBA: Multitouch Image-Based Authentication on Smartphones Daniel Ritter daniel.ritter@uni-ulm.de Florian Schaub florian.schaub@uni-ulm.de Marcel Walch marcel.walch@uni-ulm.de Michael Weber michael.weber@uni-ulm.de

More information

Available Online through

Available Online through D. Saravanan*et al. /International Journal of Pharmacy & Technology Available Online through ISSN: 0975-766X CODEN: IJPTFI Research Article www.ijptonline.com VALIDATION OF SECRET CODE USING IMAGE BASED

More information

DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS

DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS Chippy.T chippyrevathy@gmail.com Dhanalakshmi Srinivasan Engineering College R.Nagendran nanonagendran@gmail.com

More information

Sobel Edge Detection Algorithm

Sobel Edge Detection Algorithm Sobel Edge Detection Algorithm Samta Gupta 1, Susmita Ghosh Mazumdar 2 1 M. Tech Student, Department of Electronics & Telecom, RCET, CSVTU Bhilai, India 2 Reader, Department of Electronics & Telecom, RCET,

More information

NETWORK SECURITY - OVERCOME PASSWORD HACKING THROUGH GRAPHICAL PASSWORD AUTHENTICATION

NETWORK SECURITY - OVERCOME PASSWORD HACKING THROUGH GRAPHICAL PASSWORD AUTHENTICATION NETWORK SECURITY - OVERCOME PASSWORD HACKING THROUGH GRAPHICAL PASSWORD AUTHENTICATION P.Kiruthika R.Tamilarasi Department of Computer Applications, Dr.Mahalingam College Of Engineering and Technology,

More information

CARP: CAPTCHA as A Graphical Password Based Authentication Scheme

CARP: CAPTCHA as A Graphical Password Based Authentication Scheme CARP: CAPTCHA as A Graphical Password Based Authentication Scheme Shraddha S. Banne 1, Prof. Kishor N. Shedge 2 Student, Dept. of Computer Engg, S.V.I.T, Chincholi, Sinnar, Nashik, India 1 Assistant Professor,

More information

Usable Privacy and Security, Fall 2011 Nov. 10, 2011

Usable Privacy and Security, Fall 2011 Nov. 10, 2011 Usable Privacy and Security, Fall 2011 Nov. 10, 2011 YoungSeok Yoon (youngseok@cs.cmu.edu) Institute for Software Research School of Computer Science Carnegie Mellon University picture/photo based vs.

More information

International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: Volume 14 Issue 2 APRIL 2015

International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: Volume 14 Issue 2 APRIL 2015 Persuasive Cued Click Point Authentication Mechanism with Sound Signature MOUNESHWAR KANAMADI 1,AMIT SAWANT 2,JAMDADE MARUTI 3,4 MEGHARANI BAMBUGADE, 5 ROKADE KOMAL 1 Department of CSE, Ashokrao Mane Group

More information

A Novel Approach for Software Implementation of Graphical Authentication Methodology

A Novel Approach for Software Implementation of Graphical Authentication Methodology A Novel Approach for Software Implementation of Graphical Authentication Methodology Murtaza Alamshah School Of Information Technology Vellore Institute of Technology Vellore, India murtazaalamshah@gmail.com

More information

Keywords security model, online banking, authentication, biometric, variable tokens

Keywords security model, online banking, authentication, biometric, variable tokens Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Authentication

More information

AN IMPROVED MAP BASED GRAPHICAL ANDROID AUTHENTICATION SYSTEM

AN IMPROVED MAP BASED GRAPHICAL ANDROID AUTHENTICATION SYSTEM AN IMPROVED MAP BASED GRAPHICAL ANDROID AUTHENTICATION SYSTEM Safiyanu Ahmad (ahmadsafiyanu100@gmail.com) 1 ; Souley Boukari (bsouley2001@yahoo.com) 2 ; Samson Henry Dogo (dogojankasa@gmail.com) 1 and

More information

COMPARATIVE STUDY OF GRAPHICAL USER AUTHENTICATION APPROACHES

COMPARATIVE STUDY OF GRAPHICAL USER AUTHENTICATION APPROACHES Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

Image Password Based Authentication in an Android System

Image Password Based Authentication in an Android System Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

Highly Secure Authentication Scheme: A Review

Highly Secure Authentication Scheme: A Review e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Highly Secure Authentication Scheme:

More information

COMPARATIVE STUDY OF IMAGE FUSION TECHNIQUES IN SPATIAL AND TRANSFORM DOMAIN

COMPARATIVE STUDY OF IMAGE FUSION TECHNIQUES IN SPATIAL AND TRANSFORM DOMAIN COMPARATIVE STUDY OF IMAGE FUSION TECHNIQUES IN SPATIAL AND TRANSFORM DOMAIN Bhuvaneswari Balachander and D. Dhanasekaran Department of Electronics and Communication Engineering, Saveetha School of Engineering,

More information

DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS

DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS Abdul Rasheed. Sk 1 Asst. Professor Narasaraopeta Engineering College, Narasaraopet. rasheed4321@gmail.com

More information

A VISUAL DICTIONARY ATTACK ON PICTURE PASSWORDS. Amir Sadovnik and Tsuhan Chen. Department of Electrical and Computer Engineering, Cornell University

A VISUAL DICTIONARY ATTACK ON PICTURE PASSWORDS. Amir Sadovnik and Tsuhan Chen. Department of Electrical and Computer Engineering, Cornell University A VISUAL DICTIONARY ATTACK ON PICTURE PASSWORDS Amir Sadovnik and Tsuhan Chen Department of Electrical and Computer Engineering, Cornell University ABSTRACT Microsoft s Picture Password provides a method

More information

A Survey on Different Graphical Password Authentication Techniques

A Survey on Different Graphical Password Authentication Techniques A Survey on Different Graphical Password Authentication Techniques Saranya Ramanan 1, Bindhu J S 2 PG scholar, Department of Computer Science, College of Engineering, Perumon, Kerala, India 1 Associate

More information

A Novel Graphical Password Authentication Scheme

A Novel Graphical Password Authentication Scheme A Novel Graphical Password Authentication Scheme 1 L. Lakshmi reddy & 2 J. Nagamuneiah 1 M.Tech (CSE), CREC, Tirupati, Email Id: lakshmireddy49@gmail.com 2 Associate professor, CREC, Tirupati, Email Id:

More information

Survey on Various Techniques of User Authentication and Graphical Password

Survey on Various Techniques of User Authentication and Graphical Password Survey on Various Techniques of User Authentication and Graphical Password Miss. Saraswati B. Sahu #1, Associate Prof. Angad Singh *2 1(M. Tech Scholar, Dept. of Information Technology, NIIST, Bhopal,

More information

MULTI-FACTOR AUTHENTICATION USING GRAPHICAL PASSWORDS THROUGH HANDHELD DEVICE

MULTI-FACTOR AUTHENTICATION USING GRAPHICAL PASSWORDS THROUGH HANDHELD DEVICE MULTI-FACTOR AUTHENTICATION USING GRAPHICAL PASSWORDS THROUGH HANDHELD DEVICE P.Shyam Sunder 1, Ballikonda Sai Chaitanya 2, D.Vijay Kumar 3, P.Satya Shekar Varma 4 1,2,4 Department of Computer Science

More information

An image edge based approach for image password encryption

An image edge based approach for image password encryption SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2016; 9:5733 5745 Published online 16 January 2017 in Wiley Online Library (wileyonlinelibrary.com)..1732 RESEARCH ARTICLE An image edge based

More information

Fuzzy Inference System based Edge Detection in Images

Fuzzy Inference System based Edge Detection in Images Fuzzy Inference System based Edge Detection in Images Anjali Datyal 1 and Satnam Singh 2 1 M.Tech Scholar, ECE Department, SSCET, Badhani, Punjab, India 2 AP, ECE Department, SSCET, Badhani, Punjab, India

More information

CARP-A NEW SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS

CARP-A NEW SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.12

More information

A Multi-Grid Graphical Password Scheme

A Multi-Grid Graphical Password Scheme A Multi-Grid Graphical Password Scheme Konstantinos CHALKIAS, Anastasios ALEXIADIS, George STEPHANIDES Dept. of Applied Informatics, Macedonia University, 156 Egnatia str., 540 06 Thessaloniki, Greece

More information

International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18, ISSN

International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18,   ISSN International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18, www.ijcea.com ISSN 2321-3469 SURVEY ON OBJECT TRACKING IN REAL TIME EMBEDDED SYSTEM USING IMAGE PROCESSING

More information

OCR For Handwritten Marathi Script

OCR For Handwritten Marathi Script International Journal of Scientific & Engineering Research Volume 3, Issue 8, August-2012 1 OCR For Handwritten Marathi Script Mrs.Vinaya. S. Tapkir 1, Mrs.Sushma.D.Shelke 2 1 Maharashtra Academy Of Engineering,

More information

An Ancient Indian Board Game as a Tool for Authentication

An Ancient Indian Board Game as a Tool for Authentication An Ancient Indian Board Game as a Tool for Authentication Sreelatha Malempati 1 and Shashi Mogalla 2 1 Department of Computer Science and Engineering RVR & JC College of Engineering, Guntur, A.P. e-mail:

More information

Novel Security Method Using Captcha as Graphical Password

Novel Security Method Using Captcha as Graphical Password International Journal of Emerging Engineering Research and Technology Volume 3, Issue 2, February 2015, PP 18-24 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Novel Security Method Using Captcha as

More information

A Generalized Method to Solve Text-Based CAPTCHAs

A Generalized Method to Solve Text-Based CAPTCHAs A Generalized Method to Solve Text-Based CAPTCHAs Jason Ma, Bilal Badaoui, Emile Chamoun December 11, 2009 1 Abstract We present work in progress on the automated solving of text-based CAPTCHAs. Our method

More information

Implementation of Knowledge Based Authentication System Using Persuasive Cued Click Points

Implementation of Knowledge Based Authentication System Using Persuasive Cued Click Points IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 2 (May. - Jun. 2013), PP 39-46 Implementation of Knowledge Based Authentication System Using Persuasive

More information

Object Extraction Using Image Segmentation and Adaptive Constraint Propagation

Object Extraction Using Image Segmentation and Adaptive Constraint Propagation Object Extraction Using Image Segmentation and Adaptive Constraint Propagation 1 Rajeshwary Patel, 2 Swarndeep Saket 1 Student, 2 Assistant Professor 1 2 Department of Computer Engineering, 1 2 L. J. Institutes

More information

Fine Classification of Unconstrained Handwritten Persian/Arabic Numerals by Removing Confusion amongst Similar Classes

Fine Classification of Unconstrained Handwritten Persian/Arabic Numerals by Removing Confusion amongst Similar Classes 2009 10th International Conference on Document Analysis and Recognition Fine Classification of Unconstrained Handwritten Persian/Arabic Numerals by Removing Confusion amongst Similar Classes Alireza Alaei

More information

Enhancing CAPTCHA based Image Authentication for ID and Password

Enhancing CAPTCHA based Image Authentication for  ID and Password ISSN (O): 2349-7084 International Journal of Computer Engineering In Research Trends Available online at: www.ijcert.org Enhancing CAPTCHA based Image Authentication for E-mail ID and Password 1MACHARLA

More information

: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION

: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION 2006-287: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION Mario Garcia, Texas A&M University-Corpus Christi American Society for Engineering Education, 2006 Page 11.277.1 Biometric Authentication

More information

Image processing. Reading. What is an image? Brian Curless CSE 457 Spring 2017

Image processing. Reading. What is an image? Brian Curless CSE 457 Spring 2017 Reading Jain, Kasturi, Schunck, Machine Vision. McGraw-Hill, 1995. Sections 4.2-4.4, 4.5(intro), 4.5.5, 4.5.6, 5.1-5.4. [online handout] Image processing Brian Curless CSE 457 Spring 2017 1 2 What is an

More information

Robust Phase-Based Features Extracted From Image By A Binarization Technique

Robust Phase-Based Features Extracted From Image By A Binarization Technique IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 4, Ver. IV (Jul.-Aug. 2016), PP 10-14 www.iosrjournals.org Robust Phase-Based Features Extracted From

More information

A Survey on Graphical Passwords in Providing Security

A Survey on Graphical Passwords in Providing Security A Survey on Graphical Passwords in Providing Security Mrs. Anuradha. V #, Mr.M.Nagesh *, Mr.N. Vijaya sunder sagar # # M.Tech., Dept. of CSE, Ashoka Institute of Engineering & Technology, JNTU Hyderabad

More information

Improving Latent Fingerprint Matching Performance by Orientation Field Estimation using Localized Dictionaries

Improving Latent Fingerprint Matching Performance by Orientation Field Estimation using Localized Dictionaries Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,

More information

Keywords Binary Linked Object, Binary silhouette, Fingertip Detection, Hand Gesture Recognition, k-nn algorithm.

Keywords Binary Linked Object, Binary silhouette, Fingertip Detection, Hand Gesture Recognition, k-nn algorithm. Volume 7, Issue 5, May 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Hand Gestures Recognition

More information

Address for Correspondence 1 Associate Professor department o f Computer Engineering BVUCOE, Pune

Address for Correspondence 1 Associate Professor department o f Computer Engineering BVUCOE, Pune Research Article THREE DIMENSIONAL VIRTUAL ENVIRONMENT FOR SECURED AND RELIABLE AUTHENTICATION 1 Gauri Rao, 2 Dr. S.H. Patil Address for Correspondence 1 Associate Professor department o f Computer Engineering

More information

SECURED PASSWORD MANAGEMENT TECHNIQUE USING ONE-TIME PASSWORD PROTOCOL IN SMARTPHONE

SECURED PASSWORD MANAGEMENT TECHNIQUE USING ONE-TIME PASSWORD PROTOCOL IN SMARTPHONE Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,

More information

FACE DETECTION AND LOCALIZATION USING DATASET OF TINY IMAGES

FACE DETECTION AND LOCALIZATION USING DATASET OF TINY IMAGES FACE DETECTION AND LOCALIZATION USING DATASET OF TINY IMAGES Swathi Polamraju and Sricharan Ramagiri Department of Electrical and Computer Engineering Clemson University ABSTRACT: Being motivated by the

More information

ISSN: (Online) Volume 2, Issue 10, October 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 2, Issue 10, October 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 10, October 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Implementing a Secure Authentication System

Implementing a Secure Authentication System Implementing a Secure Authentication System BRUNO CARPENTIERI Dipartimento di Informatica Università di Salerno Via Giovanni Paolo II ITALY bc@dia.unisa.it Abstract: One of the most used techniques for

More information

Biometrics Technology: Image Processing & Pattern Recognition (by Dr. Dickson Tong)

Biometrics Technology: Image Processing & Pattern Recognition (by Dr. Dickson Tong) Biometrics Technology: Image Processing & Pattern Recognition (by Dr. Dickson Tong) References: [1] http://homepages.inf.ed.ac.uk/rbf/hipr2/index.htm [2] http://www.cs.wisc.edu/~dyer/cs540/notes/vision.html

More information

Graphical Authentication System

Graphical Authentication System Graphical Authentication System A Sivasankar Reddy 1, M Kusuma 2 1 Student, Dept. of MCA, EAIMS 2 Professor, Dept. of MCA, EAIMS, Tirupati, A.P. Abstract- This evolution brings great convenience but also

More information

USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS

USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS USER AUTHENTICATION USING NATIVE LANGUAGE PASSWORDS Sreelatha Malempati Dept. of Computer Science & Engineering R.V.R. & J.C. College of Engineering Chowdavaram, Guntur, A.P lathamoturi@rediffmail.com

More information

Pixel Value Graphical Password Scheme: Fake Passpix Attempt on Hexadecimal Password Style

Pixel Value Graphical Password Scheme: Fake Passpix Attempt on Hexadecimal Password Style International Journal of Information and Communication Sciences 2018; 3(3): 104-109 http://www.sciencepublishinggroup.com/j/ijics doi: 10.11648/j.ijics.20180303.14 ISSN: 2575-1700 (Print); ISSN: 2575-1719

More information

Analysis of Image and Video Using Color, Texture and Shape Features for Object Identification

Analysis of Image and Video Using Color, Texture and Shape Features for Object Identification IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. VI (Nov Dec. 2014), PP 29-33 Analysis of Image and Video Using Color, Texture and Shape Features

More information

Advance Shadow Edge Detection and Removal (ASEDR)

Advance Shadow Edge Detection and Removal (ASEDR) International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 2 (2017), pp. 253-259 Research India Publications http://www.ripublication.com Advance Shadow Edge Detection

More information

Thematic Graphical User Authentication: Graphical User Authentication Using Themed Images on Mobile Devices

Thematic Graphical User Authentication: Graphical User Authentication Using Themed Images on Mobile Devices Int'l Conf. Security and Management SAM'17 273 Thematic Graphical User Authentication: Graphical User Authentication Using Themed Images on Mobile Devices Joshua Sherfield 1, Cheryl V. Hinds 2 1 Lawrence

More information

OFFLINE SIGNATURE VERIFICATION

OFFLINE SIGNATURE VERIFICATION International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 8, Issue 2, March - April 2017, pp. 120 128, Article ID: IJECET_08_02_016 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=8&itype=2

More information

Adaptive Gesture Recognition System Integrating Multiple Inputs

Adaptive Gesture Recognition System Integrating Multiple Inputs Adaptive Gesture Recognition System Integrating Multiple Inputs Master Thesis - Colloquium Tobias Staron University of Hamburg Faculty of Mathematics, Informatics and Natural Sciences Technical Aspects

More information

Comparative Analysis of Edge Detection Algorithms Based on Content Based Image Retrieval With Heterogeneous Images

Comparative Analysis of Edge Detection Algorithms Based on Content Based Image Retrieval With Heterogeneous Images Comparative Analysis of Edge Detection Algorithms Based on Content Based Image Retrieval With Heterogeneous Images T. Dharani I. Laurence Aroquiaraj V. Mageshwari Department of Computer Science, Department

More information

SURVEY ON IMAGE PROCESSING IN THE FIELD OF DE-NOISING TECHNIQUES AND EDGE DETECTION TECHNIQUES ON RADIOGRAPHIC IMAGES

SURVEY ON IMAGE PROCESSING IN THE FIELD OF DE-NOISING TECHNIQUES AND EDGE DETECTION TECHNIQUES ON RADIOGRAPHIC IMAGES SURVEY ON IMAGE PROCESSING IN THE FIELD OF DE-NOISING TECHNIQUES AND EDGE DETECTION TECHNIQUES ON RADIOGRAPHIC IMAGES 1 B.THAMOTHARAN, 2 M.MENAKA, 3 SANDHYA VAIDYANATHAN, 3 SOWMYA RAVIKUMAR 1 Asst. Prof.,

More information

3D PASSWORD AUTHENTICATION FOR WEB SECURITY

3D PASSWORD AUTHENTICATION FOR WEB SECURITY 3D PASSWORD AUTHENTICATION FOR WEB SECURITY Sahana R.Gadagkar 1, Aditya Pawaskar 2, Mrs. Ranjeeta B. Pandhare 3 1,2 Department of Computer Science & Engineering, KIT s College of Engineering, Kolhapur,

More information

Face Recognition using Eigenfaces SMAI Course Project

Face Recognition using Eigenfaces SMAI Course Project Face Recognition using Eigenfaces SMAI Course Project Satarupa Guha IIIT Hyderabad 201307566 satarupa.guha@research.iiit.ac.in Ayushi Dalmia IIIT Hyderabad 201307565 ayushi.dalmia@research.iiit.ac.in Abstract

More information

Enhanced Textual Password Scheme for Better Security and Memorability

Enhanced Textual Password Scheme for Better Security and Memorability Enhanced Textual Password Scheme for Better Security and Memorability Hina Bhanbhro Department of Computer Syst. Eng. Faculty of Electrical, Electronics & Computer Systems Engineering Shaheed Benazir Bhutto

More information

International Journal of Electrical and Computer Engineering 4: Application of Neural Network in User Authentication for Smart Home System

International Journal of Electrical and Computer Engineering 4: Application of Neural Network in User Authentication for Smart Home System Application of Neural Network in User Authentication for Smart Home System A. Joseph, D.B.L. Bong, and D.A.A. Mat Abstract Security has been an important issue and concern in the smart home systems. Smart

More information

A Text based Authentication Scheme for Improving Security of Textual Passwords

A Text based Authentication Scheme for Improving Security of Textual Passwords A Text based Authentication Scheme for Improving Security of Textual Passwords Shah Zaman Nizamani Department of Information Technology Quaid-e-Awam University of Engineering, Science & Technology, Pakistan

More information

Graphical Password Authentication: Methods and Schemes

Graphical Password Authentication: Methods and Schemes Graphical Password Authentication: Methods and Schemes Geeta M. Rane, Student (BE) of Computer Science and Engineering, Shri Sant Gadge Baba College of Engineering & Technology, Bhusawal, North Maharashtra

More information

Palmprint Recognition Using Transform Domain and Spatial Domain Techniques

Palmprint Recognition Using Transform Domain and Spatial Domain Techniques Palmprint Recognition Using Transform Domain and Spatial Domain Techniques Jayshri P. Patil 1, Chhaya Nayak 2 1# P. G. Student, M. Tech. Computer Science and Engineering, 2* HOD, M. Tech. Computer Science

More information

Captcha as Graphical Passwords (Security Primitive Based On Hard Ai Problems)

Captcha as Graphical Passwords (Security Primitive Based On Hard Ai Problems) RESEARCH ARTICLE OPEN ACCESS Captcha as Graphical Passwords (Security Primitive Based On Hard Ai Problems) 1. Valusani Shrenika, M.Tech student, 2 Mr.D.Uma Vishweshwar,, Hyderabad Asst.Professor, Abstract

More information

A THIRD GENERATION AUTOMATIC DEFECT RECOGNITION SYSTEM

A THIRD GENERATION AUTOMATIC DEFECT RECOGNITION SYSTEM A THIRD GENERATION AUTOMATIC DEFECT RECOGNITION SYSTEM F. Herold 1, K. Bavendiek 2, and R. Grigat 1 1 Hamburg University of Technology, Hamburg, Germany; 2 YXLON International X-Ray GmbH, Hamburg, Germany

More information